DoDD 8140 (DoDD 8570) Compliance Training

DoD 8140/8570 Compliance Training

DoD 8140 Compliance

Department of Defense Directive 8570 has been replaced by the DoD CIO as DoDD 8140; DoDD 8570 is now a part of a larger initiative that falls under the guidelines of DoDD 8140. DoDD 8140 provides guidance and procedures for the training, certification, and management of all government employees who conduct Information Assurance functions in assigned duty positions. These individuals are required to carry an approved certification for their particular job classification. GIAC certifications are among those required for Technical, Management, CND, and IASAE classifications!

DoDD 8140 (DoDD 8570) Requires:

» All personnel performing IAT and IAM functions must be certified.» All personnel performing CND-SP and IASAE roles must be certified.» All IA jobs will be categorized as ‘Technical’ or ‘Management’ Level I, II, or III, and to be qualified for those jobs, you must be certified.

Who is Affected by DoDD 8140/8570?

Any full or part-time military service member, contractor, or local nationals with privileged access to a DoD information system performing information assurance (security) functions — regardless of job or occupational series.

» Office of the Secretary of Defense» Military Departments» Chairman of the Joint Chiefs of Staff» Combatant Commands» Office of the Inspector General of the DoD» Defense Agencies» DoD Field Activities» All other organizational entities in the DoD

For More Information About DoDD 8140/8570:

DoD Approved 8140 Baseline Certifications

Personnel performing IA functions must obtain one of the certifications required for their position category or specialty and level. The following certifications have been approved as IA baseline certifications for the IA Workforce.

Why is ENO the Best source for Information Security Training?

ENO is the leading organization in computer security training. ENO provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and networks against the most dangerous threats — the ones being actively exploited. The courses are full of important and immediately useful techniques that students can put to work as soon as they return to their offices through courses that are updated multiple times throughout the year. ENO courses were developed through a consensus process involving hundreds of administrators, security managers, and information security professionals. Our courses address both security fundamentals and the in-depth technical aspects of the most crucial areas of information security.

WHAT PEOPLE SAY

I got a lot out of the real world scenarios presented in class. Ron is very knowledgeable in the field of penetration testing. Would definitely take classes again if he is the instructor.

Anna johnsonSecurity ManagerLockheed Martin

I wanted to thank you and Leonard for the VoIP Security course. It was a very big step for us, an introduction to a world that we are not well acquainted with, and Leonard did a great job in easing our way into it.

Bryan ThompsonPrincipal EngineerUSAF

We just had an excellent four-day 4g/LTE class at our facility in Washington. I worked with ENO on the curriculum and ended with 12 highly demanding technology professionals very satisfied with the course materials and the excellent instructor!

Bill StackSr, EngineerBOEING

Jim recently wrapped up teaching a Root Cause Failure Analysis course at SIEMENS. What a remarkable instructor! His knowledge and experience was outstanding.